Sciweavers

51 search results - page 8 / 11
» icisc 2007
Sort
View
ICISC
2004
147views Cryptology» more  ICISC 2004»
13 years 10 months ago
Batch Verifications with ID-Based Signatures
An identity (ID)-based signature scheme allows any pair of users to verify each other's signatures without exchanging public key certificates. With the advent of Bilinear maps...
HyoJin Yoon, Jung Hee Cheon, Yongdae Kim
ICISC
2004
127views Cryptology» more  ICISC 2004»
13 years 10 months ago
Identity-Based Access Control for Ad Hoc Groups
Abstract. The proliferation of group-centric computing and communication motivates the need for mechanisms to provide group access control. Group access control includes mechanisms...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
ICISC
2001
162views Cryptology» more  ICISC 2001»
13 years 10 months ago
Content Extraction Signatures
Motivated by emerging needs in online interactions, we define a new type of digital signature called a `Content Extraction Signature' (CES). A CES allows the owner, Bob, of a...
Ron Steinfeld, Laurence Bull, Yuliang Zheng
ICISC
2003
90views Cryptology» more  ICISC 2003»
13 years 10 months ago
Providing Receipt-Freeness in Mixnet-Based Voting Protocols
Abstract. It had been thought that it is difficult to provide receiptfreeness in mixnet-based electronic voting schemes. Any kind of user chosen randomness can be used to construct...
Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Ki...
ICISC
2003
89views Cryptology» more  ICISC 2003»
13 years 10 months ago
Security Analysis of Some Proxy Signatures
Abstract. A proxy signature scheme allows an entity to delegate his/her signing capability to another entity in such a way that the latter can sign messages on behalf of the former...
Guilin Wang, Feng Bao, Jianying Zhou, Robert H. De...